default search action
Mohsen Machhout
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Chokri Ajroud, Jamel Hattay, Mohsen Machhout:
A novel holographic technique for RFID localization in indoor environments. Multim. Tools Appl. 83(10): 29827-29840 (2024) - [j37]Amal Hafsa, Mohamed Gafsi, Mohsen Machhout:
A lightweight and robust block cipher algorithm for real-time applications. Signal Image Video Process. 18(2): 1609-1624 (2024) - [j36]Mohamed Gafsi, Amal Hafsa, Mohsen Machhout:
Hardware implementation of digital pseudo-random number generators for real-time applications. Signal Image Video Process. 18(5): 4407-4423 (2024) - [j35]Hassen Mestiri, Imen Barraj, Mouna Bedoui, Mohsen Machhout:
An ASCON AOP-SystemC Environment for Security Fault Analysis. Symmetry 16(3): 348 (2024) - [c61]Daassa Asma, Mohsen Machhout, Sonia Ayachi Ghannouchi, Taoufik Aguili:
Access control based on roles and groups: Case study Building a secure Smart Hospital using BPMS. ATSIP 2024: 306-311 - [c60]Ayoub Mhaouch, Wadhah Ayadi, Sarra Ridha, Khaled Issa, Abdessalem Ben Abdelali, Mohsen Machhout:
An efficient hardware implementation of LED lightweight block cipher. ATSIP 2024: 312-316 - [c59]Ayoub Mhaouch, Marwa Fradi, Wafa Gtifa, Khaled Issa, Abdessalem Ben Abdelali, Mohsen Machhout:
High-Performance Hardware Implementation of LED block cipher. ATSIP 2024: 317-321 - 2023
- [j34]Lazhar Khriji, Soulef Bouaafia, Seifeddine Messaoud, Ahmed Chiheb Ammari, Mohsen Machhout:
Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications. IEEE Access 11: 36787-36804 (2023) - [j33]Wajih El Hadj Youssef, Ali Abdelli, Fehmi Kharroubi, Fethi Dridi, Lazhar Khriji, Razzaqul Ahshan, Mohsen Machhout, Sarvar Hussain Nengroo, Sangkeum Lee:
A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things. IEEE Access 11: 123279-123294 (2023) - [j32]Mouna Bedoui, Belgacem Bouallegue, Abdelmoty M. Ahmed, Belgacem Hamdi, Mohsen Machhout, Mahmoud, Mahmoud Khattab:
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm. Comput. Syst. Sci. Eng. 44(3): 2177-2193 (2023) - [j31]Mouna Bedoui, Belgacem Bouallegue, Hassen Mestiri, Belgacem Hamdi, Mohsen Machhout:
An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm. Multim. Tools Appl. 82(8): 11973-11992 (2023) - [c58]Ali Abdelli, Wajih El Hadj Youssef, Mohsen Machhout:
Integration of Lightweights Blocks Ciphers as an Extension into Microprocessor for IoT Security. SSD 2023: 243-248 - [c57]Syrine Neffati, Mohsen Machhout:
Optimized classification system for MRIs with MOO technique and SVM. SSD 2023: 351-355 - [c56]Lazhar Khriji, Seifeddine Messaoud, Soulef Bouaafia, Ahmed Chiheb Ammari, Mohsen Machhout:
Enhanced CNN Security based on Adversarial FGSM Attack Learning: Medical Image Classification. SSD 2023: 360-365 - [c55]Alaaeddine Rjeb, Amr M. Ragheb, Maged Abdullah Esmail, Habib Fathallah, Mohsen Machhout, Saleh Al-Shebeili:
Design of Novel Reciprocal Inverse Graded Index Fiber (R-IGIF) For OAM-SDM communication Systems. SSD 2023: 564-568 - [c54]Fatma Sbiaa, Sonia Kotel, Mohsen Machhout:
A Selective Video Encryption Scheme Based on a Block Cipher Algorithm and a Chaos Generator. CW 2023: 380-387 - [c53]Syrine Neffati, Mohsen Machhout:
An Optimized Computer-Aided Diagnosis System for MRI Classification. ICSC 2023: 8-12 - [c52]Syrine Neffati, Mohsen Machhout:
Optimized CAD System for Breast Cancer Detection with Tabu Search and RNN. ICSC 2023: 20-25 - 2022
- [j30]Marwa Fradi, El-hadi Zahzah, Mohsen Machhout:
Real-time application based CNN architecture for automatic USCT bone image segmentation. Biomed. Signal Process. Control. 71(Part): 103123 (2022) - [j29]Seifeddine Messaoud, Soulef Bouaafia, Amna Maraoui, Ahmed Chiheb Ammari, Lazhar Khriji, Mohsen Machhout:
Deep convolutional neural networks-based Hardware-Software on-chip system for computer vision application. Comput. Electr. Eng. 98: 107671 (2022) - [j28]Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout:
An improvement of both security and reliability for AES implementations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9844-9851 (2022) - [j27]Amal Hafsa, Marwa Fradi, Anissa Sghaier, Jihene Malek, Mohsen Machhout:
Real-time video security system using chaos- improved advanced encryption standard (IAES). Multim. Tools Appl. 81(2): 2275-2298 (2022) - [j26]Marwa Fradi, El-hadi Zahzah, Kais Bouallegue, Mohsen Machhout:
Deep learning based neural network application for automatic ultrasonic computed tomographic bone image segmentation. Multim. Tools Appl. 81(10): 13537-13562 (2022) - [j25]Marwa Fradi, Lazhar Khriji, Mohsen Machhout:
Real-time arrhythmia heart disease detection system using CNN architecture based various optimizers-networks. Multim. Tools Appl. 81(29): 41711-41732 (2022) - [j24]Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, Rim Brahim, Mohsen Machhout:
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security. Secur. Commun. Networks 2022: 9709601:1-9709601:17 (2022) - [j23]Anissa Sghaier, Medien Zeghid, Chiraz Massoud, Hassan Yousif Ahmed, Abdellah Chehri, Mohsen Machhout:
Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications. Sensors 22(7): 2535 (2022) - [j22]Samir Belaid, Jamel Hattay, Mohsen Machhout:
Tele-Holography: a new concept for lossless compression and transmission of inline digital holograms. Signal Image Video Process. 16(6): 1659-1666 (2022) - [c51]Chokri Ajroud, Jamel Hattay, Mohsen Machhout:
Holographic Multi-Reader RFID Localization Method for Static Tags. CoDIT 2022: 1393-1396 - 2021
- [j21]Mouna Karmani, Noura Benhadjyoussef, Belgacem Hamdi, Mohsen Machhout:
The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core. IET Comput. Digit. Tech. 15(2): 160-170 (2021) - [j20]Amal Hafsa, Anissa Sghaier, Jihene Malek, Mohsen Machhout:
Image encryption method based on improved ECC and modified AES algorithm. Multim. Tools Appl. 80(13): 19769-19801 (2021) - [j19]Amal Hafsa, Mohamed Gafsi, Jihene Malek, Mohsen Machhout:
FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption. Sci. Program. 2021: 6610655:1-6610655:20 (2021) - [c50]Soulef Bouaafia, Seifeddine Messaoud, Amna Maraoui, Ahmed Chiheb Ammari, Lazhar Khriji, Mohsen Machhout:
Deep Pre-trained Models for Computer Vision Applications: Traffic sign recognition. SSD 2021: 23-28 - [c49]Alaaeddine Rjeb, Hussein Seleem, Habib Fathallah, Mohsen Machhout:
A Novel Inverse Gaussian Profile for Orbital Angular Momentum Mode Division Multiplexing Optical Networks. SSD 2021: 480-487 - [c48]Amna Maraoui, Seifeddine Messaoud, Soulef Bouaafia, Ahmed Chiheb Ammari, Lazhar Khriji, Mohsen Machhout:
PYNQ FPGA Hardware implementation of LeNet-5-Based Traffic Sign Recognition Application. SSD 2021: 1004-1009 - [c47]Amal Hafsa, Jihene Malek, Mohsen Machhout:
Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption. SSD 2021: 1221-1229 - [c46]Amal Hafsa, Jihene Malek, Mohsen Machhout:
Secure Transmission of Medical Images using Improved Hybrid Cryptosystem: Authentication, Confidentiality and Integrity. CW 2021: 262-269 - [c45]Lazhar Khriji, Ahmed Chiheb Ammari, Seifeddine Messaoud, Soulef Bouaafia, Amna Maraoui, Mohsen Machhout:
COVID-19 Recognition Based on Patient's Coughing and Breathing Patterns Analysis: Deep Learning Approach. FRUCT 2021: 185-191 - [c44]Marwa Fradi, Mohsen Machhout:
CT-Scans Images Segmentation for COVID-19 Detection Based CNN Models. ICCAD 2021: 1-7 - 2020
- [j18]Alaaeddine Rjeb, Habib Fathallah, Khaled Issa, Mohsen Machhout, Saleh A. Alshebeili:
A Novel Hyperbolic Tangent Profile for Optical Fiber for Next Generation OAM-MDM Systems. IEEE Access 8: 226737-226753 (2020) - [j17]Amal Hafsa, Anissa Sghaier, Medien Zeghid, Jihene Malek, Mohsen Machhout:
An improved co-designed AES-ECC cryptosystem for secure data transmission. Int. J. Inf. Comput. Secur. 13(1): 118-140 (2020) - [j16]Noura Benhadjyoussef, Mouna Karmani, Mohsen Machhout, Belgacem Hamdi:
A Hybrid Countermeasure-Based Fault-Resistant AES Implementation. J. Circuits Syst. Comput. 29(3): 2050044:1-2050044:17 (2020) - [j15]Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, Mohsen Machhout:
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. Secur. Commun. Networks 2020: 8860598:1-8860598:13 (2020) - [j14]Khaoula Mannay, Jesús Ureña, Álvaro Hernández, Mohsen Machhout, Taoufik Aguili:
Characterization of an Ultrasonic Local Positioning System for 3D Measurements. Sensors 20(10): 2794 (2020) - [c43]Alaaeddine Rjeb, Habib Fathallah, Mohsen Machhout:
Numerical Investigation of orbital angular momentum mode purity in Inverse Parabolic Graded index fiber. SSD 2020: 925-928 - [c42]Alaaeddine Rjeb, Habib Fathallah, Mohsen Machhout:
Orbital Angular Momentum Mode Coupling Analysis due to Ellipticity and Birefringence in Inverse-raised Cosine Fiber. SSD 2020: 929-932 - [c41]Noura Benhadjyoussef, Mouna Karmani, Mohsen Machhout:
The Secured AES designs against Fault Injection Attacks: A comparative Study. ATSIP 2020: 1-4 - [c40]Mouna Karmani, Noura Benhadjyoussef, Belgacem Hamdi, Mohsen Machhout:
A Hardware-Software Codesign Case Study: The SHA3-512 algorithm Implementation on the LEON3 Processor. ATSIP 2020: 1-5 - [c39]Marwa Fradi, Mouna Afif, El-hadi Zahzeh, Kais Bouallegue, Mohsen Machhout:
Transfer-Deep Learning Application for Ultrasonic Computed Tomographic Image Classification. ICCAD 2020: 1-6 - [c38]Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout:
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. ICITST 2020: 1-5 - [c37]Hassen Mestiri, Imen Barraj, Mohsen Machhout:
A High-Speed KECCAK Architecture Resistant to Fault Attacks. ICM 2020: 1-4 - [c36]Lazhar Khriji, Marwa Fradi, Mohsen Machhout, Abdulnasir Hossen:
Deep Learning-Based Approach for Atrial Fibrillation Detection. ICOST 2020: 100-113
2010 – 2019
- 2019
- [c35]Fethi Dridi, Safwan El Assad, Wajih El Hadj Youssef, Mohsen Machhout:
FPGA Implementation of a Pseudo-Chaotic Number Generator and Evaluation of its Performance. IINTEC 2019: 231-234 - 2018
- [j13]Yassine Naija, Vincent Beroulle, Mohsen Machhout:
Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag. J. Electron. Test. 34(3): 291-304 (2018) - [j12]Anissa Sghaier, Zeghid Medien, Loubna Ghammam, Sylvain Duquesne, Mohsen Machhout, Hassan Yousif Ahmed:
High speed and efficient area optimal ate pairing processor implementation over BN and BLS12 curves on FPGA. Microprocess. Microsystems 61: 227-241 (2018) - [j11]Nabil Ben Slimane, Nahed Aouf, Kais Bouallegue, Mohsen Machhout:
A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multim. Tools Appl. 77(23): 30993-31019 (2018) - [c34]Nabil Ben Slimane, Nahed Aouf, Kais Bouallegue, Mohsen Machhout:
Hash Key-Based Image Cryptosystem Using Chaotic Maps and Cellular Automata. SSD 2018: 190-194 - [c33]Farah Dhib, Elmehdi Tatar, Mohsen Machhout:
Hardware implementation of a fingerprint recognition algorithm on FPGA cyclone II. DATA 2018: 5:1-5:7 - [c32]Yassine Naija, Vincent Beroulle, Mohsen Machhout:
ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures. EURFID 2018: 1-7 - 2017
- [j10]Fatma Sbiaa, Sonia Kotel, Zeghid Medien, Rached Tourki, Mohsen Machhout, Adel Baganne:
High-Level Implementation of a Chaotic and AES Based Crypto-System. J. Circuits Syst. Comput. 26(7): 1750122:1-1750122:23 (2017) - [j9]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. J. Hardw. Syst. Secur. 1(3): 219-236 (2017) - [c31]Abdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation. AICCSA 2017: 226-231 - [c30]Nabil Ben Slimane, Kais Bouallegue, Mohsen Machhout:
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1. ICCAD 2017: 141-145 - [c29]Marwa Fradi, Wajih El Hadj Youssef, Mohsen Machhout:
The design of an embedded system (SOPC) for an image processing application. ICCAD 2017: 511-515 - [c28]Fatma Sbiaa, Mohsen Machhout, Medien Zeghid:
Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard. ICCTA 2017: 50-56 - [c27]Sonia Kotel, Zeghid Medien, Mohsen Machhout, Rached Tourki:
Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices. IDEAS 2017: 192-199 - [i7]Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallegue, Mohsen Machhout:
Lyapunov Exponent Evaluation of the CBC Mode of Operation. CoRR abs/1706.08099 (2017) - [i6]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CoRR abs/1708.03243 (2017) - 2016
- [j8]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving Chaotic Behavior of CBC Mode of Operation. Int. J. Bifurc. Chaos 26(7): 1650113:1-1650113:10 (2016) - [j7]Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor. J. Circuits Syst. Comput. 25(4): 1650026:1-1650026:15 (2016) - [j6]Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout:
A high-speed AES design resistant to fault injection attacks. Microprocess. Microsystems 41: 47-55 (2016) - [c26]Sonia Kotel, Fatma Sbiaa, Zeghid Medien, Mohsen Machhout, Adel Baganne, Rached Tourki:
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator. CIT 2016: 375-382 - [c25]Fatma Sbiaa, Sonia Kotel, Zeghid Medien, Rached Tourki, Mohsen Machhout, Adel Baganne:
A Selective Encryption Scheme with Multiple Security Levels for the H.264/AVC Video Coding Standard. CIT 2016: 391-398 - [c24]Sonia Kotel, Fatma Sbiaa, Zeghid Medien, Mohsen Machhout, Adel Baganne, Rached Tourki:
Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices. AICCSA 2016: 1-7 - [c23]Nejmeddine Alimi, Younes Lahbib, Mohsen Machhout, Rached Tourki:
On Elliptic Curve Cryptography implementations and evaluation. ATSIP 2016: 35-40 - [c22]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative evaluation of chaotic CBC mode of operation. ATSIP 2016: 88-92 - [c21]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. CRiSIS 2016: 185-198 - [c20]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CSE/EUC/DCABES 2016: 436-443 - [c19]Yassine Naija, Vincent Beroulle, David Hély, Mohsen Machhout:
Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform. DTIS 2016: 1-3 - [c18]Asma Mkhinini, Paolo Maistri, Régis Leveugle, Rached Tourki, Mohsen Machhout:
A flexible RNS-based large polynomial multiplier for Fully Homomorphic Encryption. IDT 2016: 131-136 - [c17]Souhir Gabsi, Anissa Sghaier, Zeghid Medien, Mohsen Machhout:
Efficient software implementation of the final exponentiation for pairing. IPAS 2016: 1-4 - [c16]Chiraz Massoud, Anissa Sghaier, Zeghid Medien, Mohsen Machhout:
Efficient software implementation of RNS-montgomery modular multiplication for embedded system. IPAS 2016: 1-5 - [c15]Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
A reliable fault detection scheme for the AES hardware implementation. ISIVC 2016: 47-52 - [c14]Hassen Mestiri, Fatma Kahri, Mouna Bedoui, Belgacem Bouallegue, Mohsen Machhout:
High throughput pipelined hardware implementation of the KECCAK hash function. ISIVC 2016: 282-286 - [c13]Anissa Sghaier, Zeghid Medien, Mohsen Machhout:
Fast hardware implementation of ECDSA signature scheme. ISIVC 2016: 343-348 - [c12]Nejmeddine Alimi, Younes Lahbib, Mohsen Machhout, Rached Tourki:
Simulation-based verification of large-integer arithmetic circuits. IVSW 2016: 1-6 - [c11]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. SPACE 2016: 138-156 - [i5]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative Evaluation of Chaotic CBC Mode of Operation. CoRR abs/1601.08139 (2016) - [i4]Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout:
The dynamics of the CBC Mode of Operation. CoRR abs/1605.02950 (2016) - [i3]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving chaotic behaviour of CBC mode of operation. CoRR abs/1608.05838 (2016) - [i2]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2016: 487 (2016) - 2015
- [j5]Hassen Mestiri, Younes Lahbib, Mohsen Machhout, Rached Tourki:
An AOP-Based Fault Injection Environment for Cryptographic SystemC Designs. J. Circuits Syst. Comput. 24(1): 1550008:1-1550008:22 (2015) - [j4]Noura Benhadjyoussef, Wajih Elhadjyoussef, Mohsen Machhout, Rached Tourki, Kholdoun Torki:
Enhancing a 32-Bit Processor Core with Efficient Cryptographic Instructions. J. Circuits Syst. Comput. 24(10): 1550158:1-1550158:21 (2015) - [c10]Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. SSD 2015: 1-5 - [c9]Anissa Sghaier, Zeghid Medien, Mohsen Machhout:
Proposed efficient arithmetic operations architectures for Hyperelliptic Curves Cryptosystems (HECC). SSD 2015: 1-5 - [i1]Anissa Sghaier, Loubna Ghammam, Zeghid Medien, Sylvain Duquesne, Mohsen Machhout:
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. IACR Cryptol. ePrint Arch. 2015: 1100 (2015) - 2014
- [c8]Amine Mrabet, Belgacem Bouallegue, Nadia El Mrabet, Mohsen Machhout, Sihem Mesnager:
Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates. GSCIT 2014: 1-6 - [c7]Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki:
Instruction set extensions of AES algorithms for 32-bit processors. ICCST 2014: 1-5 - [c6]Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki:
A low-resource 32-bit datapath ECDSA design for embedded applications. ICCST 2014: 1-6 - 2013
- [j3]Besma Othmani, Mohsen Machhout, Hafedh Belmabrouk, Rached Tourki, Houcine Mejri:
Effects of a magnetic field environment on quantum cloning of qubits. Quantum Inf. Process. 12(2): 945-954 (2013) - [c5]Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout, Rached Tourki:
An FPGA implementation of the SHA-3: The BLAKE hash function. SSD 2013: 1-5 - 2012
- [c4]Noura Benhadjyoussef, Mohsen Machhout, Wajih El Hadj Youssef, Rached Tourki:
A compact 32-bit AES design for embedded system. DTIS 2012: 1-4 - [c3]Hassen Mestiri, Mohsen Machhout, Rached Tourki:
Performances of the AES design in 0.18μm CMOS technology. DTIS 2012: 1-6 - [c2]Noura Benhadjyoussef, Hassen Mestiri, Mohsen Machhout, Rached Tourki:
Implementation of CPA analysis against AES design on FPGA. ICCIT 2012: 124-128 - 2010
- [j2]Zeghid Medien, Mohsen Machhout, Belgacem Bouallegue, Lazhar Khriji, Adel Baganne, Rached Tourki:
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications. Trans. Data Priv. 3(1): 43-64 (2010)
2000 – 2009
- 2009
- [j1]Mohsen Machhout, Guitouni Zied, Zeghid Medien, Rached Tourki:
Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. Int. J. Comput. Sci. Appl. 6(4): 43-62 (2009) - 2007
- [c1]Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki:
A Reconfigurable Implementation of the New Secure Hash Algorithm. ARES 2007: 281-285
Coauthor Index
aka: Belagacem Bouallegue
aka: Wajih Elhadjyoussef
aka: Zeghid Medien
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint